Sie sind auf Seite 1von 21

COMPUTER NETWORKING

\ WITH INTERNET PROTOCOLS


AND TECHNOLOGY

William Stallings ~

Upper Saddle River, New Jersey 07458


CONTENTS
"
'I

Web Site for Computer Networking with Internet Protocols and Technology vi

Preface xi
f/
'I

Chapter 0 Reader's Guide 2


0.1 Outline of the Book 3
0.2 Internet and Web Resources for this Book 5
0.3 Internet Standards 6

PART ONE OVERVIEW 11


Chapter 1 Data Networks and the Internet 12
1.1 Data Networks 13
1.2 The Internet 24
1.3 An Example Configuration 30
1.4 Intranets 31
1.5 Extranets 35
1.6 Recommended Reading and Web Sites 36
1.7 Key Terms, Review Questions, and Problems 37
Chapter 2 Protocols and the TCP lIP Protocol Suite 38
2.1 The Need for a Protocol Architecture 39
2.2 A Simple Protocol Architecture 40
2.3 OSI46
2.4 The TCP lIP Protocol Architecture 54
2.5 Internetworking 61
2.6 Recommended Reading and Web Sites 65
2.7 Key Terms, Review Questions, and Problems 68
Appendix 2A The Trivial File Transfer Protocol 70

PART TWO APPLICATIONS 75


Chapter 3 Traditional Applications 76
3.1 Terminal Access-Telnet 77
3.2 File Transfer-FTP 86
3.3 Electronic Mail-SMTP and MIME 95
3.4 Recommended Reading and Web Sites 110
3.5 Key Terms, Review Questions, and Problems 110
Chapter 4 Modern Applications 114
4.1 Web Access-HTTP 116
4.2 Internet Directory Service-DNS 128
4.3 Voice Over IP and Multimedia Support-SIP 137
4.4 Sockets 148
4.5 Recommended Reading and Web Sites 157
4.6 Key Terms, Review Questions, and Problems 158
vii
VU1 CONTENTS

PART THREE TRANSPORT PROTOCOLS 161


Chapter 5 Congestion and Performance Issues 162
5.1 The Need for Speed and Quality of Service 164
5.2 Performance Requirements 169
5.3 Performance Metrics 173
5.4 The Effects of Congestion 179
5.5 Congestion Control 184
5.6 Traffic Management 187
5.7 The Need for Flow and Error Control 188
5.8 Self-Similar Traffic 191
5.9 Recommended Reading and Web Sites 193
5.10 Key Terms, Review Questions, and Problems 194
Appendix SA Queuing Effects 195

Chapter 6 Transport Protocols 202


6.1 Connection-Oriented Transport Protocol Mechanisms 204
6.2 TCP Services 221
6.3 Transmission Control Protocol 226
6.4 UDP 234
6.5 Recommended Reading and Web Sites 235
6.6 Key Terms, Review Questions, and Problems 235
Chapter 7 TCP Traffic Control 238
7.1 TCP Flow Control and Error Control 240
7.2 TCP Congestion Control 246
7.3 Explicit Congestion Notification 263
7.4 Recommended Reading and Web Sites 266
7.5 Key Terms, Review Questions, and Problems 267

PART FOUR QUALITY OF SERVICE IN IP NETW01p{.S 270


Chapter 8 Internet Protocols 272
8.1 Principles of Internetworking 273
8.2 Internet Protocol 281
8.3 IPv6290
8.4 Recommended Reading and Web Sites 300
8.5 Key Terms, Review Questions, and Problems 301

Chapter 9 Integrated and Differentiated Services 304


9.1 Integrated Services Architecture (ISA) 306
9.2 Queuing Discipline 314 .
9.3 Random Early Detection 321
9.4 Differentiated Services 327
9.5 Recommended Reading and Web Sites 336
9.6 Key Terms, Review Questions, and Problems 338
Appendix 9A Real-Time Traffic 340
CONTENTS ix

Chapter 10 Protocols for QoS Support 344


10.1 Resource Reservation: RSVP 346
10.2 Multiprotocol Label Switching 357
10.3 Real-Time Transport Protocol (RTP) 368
10.4 Recommended Reading and Web Sites 378
10.5 Key Terms, Review Questions, and Problems 379
PART FIVE INTERNET ROUTING 382
Chapter 11 Interior Routing Protocols 384
11.1 Internet Routing Principles 385
11.2 Least-Cost Algorithms 393
11.3 Distance-Vector Protocol: RIP 399
11.4 Link-State Protocol: OSPF 405
11.5 Recommended Reading and Web Sites 414
11.6 Key Terms, Review Questions, and Problems 414
Chapter 12 Exterior Routing Protocols and Multicast 418
12.1 Path-Vector Protocols: BGP and IDRP 419
12.2 Multicasting 425
12.3 Recommended Reading and Web Sites 441
12.4 Key Terms, Review Questions, and Problems 442
PART SIX NETWORK AND LINK LAYERS 445
Chapter 13 Wide Area Networks 446
13.1 Frame Relay 447
13.2 Asynchronous Transfer Mode (ATM) 451
13.3 Cellular Wireless Networks 460
13.4 Recommended Reading and Web Sites 468
13.5 Key Terms, Review Questions, and Problems 469
Chapter 14 Data Link Control 472
14.1 Flow Control 473
14.2 Error Detection 479
14.3 Error Control 482
14.4 High-Level Data Link Control (HDLC) 487
14.5 Recommended Reading 494
14.6 Key Terms, Review Questions, and Problems 495
Appendix 14A Cyclic Redundancy Check 498
Appendix 14B Performance Issues 503
Chapter 15 Local Area Networks 510
15.1 The Emergence of High-Speed LANs 511
15.2 LAN Protocol Architecture 513
15.3 Ethernet 517
15.4 Bridges, Hubs, and Switches 522
15.5 High-Speed Ethernet 528
15.6 Wireless LANs 534
15.7 Recommended Reading and Web Sites 542
15.8 Key Terms, Review Questions, and Problems 543
x CONTENTS

PART SEVEN MANAGEMENT TOPICS 545


Chapter 16 Network Security 546
16.1 Security Requirements and Attacks 548
16.2 Confidentiality with Symmetric Encryption 550
16.3 Message Authentication and Hash Functions 559
1604 Public-Key Encryption and Digital Signatures 565
16.5 Secure Socket Layer and Transport Layer Security 572
16.6 IPv4 and IPv6 Security 577
16.7 Recommended Reading and Web Sites 582
16.8 Key Terms, Review Questions, and Problems 582
Chapter 17 Network Management 586
17 .1 Network Management Requirements 588
17.2 Network Management Systems 592
17.3 Simple Network Management Protocol (SNMP) 593
17 A Recommended Reading and Web Sites 603
17.5 Key Terms, Review Questions, and Problems 604

APPENDICES 605
Appendix A RFCs Cited in This Book 605
Appendix B Projects for Teaching Computer Networks 608
B.l Sockets Programming Projects 608
B.2 Simulation Projects 609
B.3 Performance Modeling 609
BA Research Projects 610
B.5 Reading/ReportAssignments 610
Glossary 611
Acronyms 617
References 619
Index 627
i!
INDEX
A RSA, 568-571 Identifier (VCI) field, 454
Secure Hash Algorithm (SHA-l), Virtual Path, 451-454
ABORT primitive, 231 564-565,568 characteristics, 452-453
About RTP (Web site), 379 Allow field, 127 control signaling, 453-454
Accept field, 124 America Online, 28-29 Identifier (VPI) field, 454
Acceptable use policies, 27 ANcount field, 130 AT&T Center for Internet
Accept-Encoding field, 124 Andreasson, Mark, 31 Research, 267
Accept-Language field, 124 Anon-FTP value, Content-type ATM, See Asynchronous transfer
Accounting management, 589 field, 106 mode (ATM)
Antireplay window, and security ATM Forum, 468
user requirements, 589
association, 579 ATM Hot Links, 468
ACK method, SIP, 143
Anycast, 297 AtomicAggregate, Aggregator
Acknowledged connectionless service,
Applicability statement (AS), 9 attribute, Path Attributes field,
logical link control (LLC),
Application layer, 42 422-423
515-516
Application type, MIME, 106-107 Attacks:
Acknowledgment frame, 478
Application/octet-stream subtype, active, 549-550
Acknowledgment Number field, TCP
MIME, 106-107 brute-force, 551-5521
header, 229
ApplicationiPostscript subtype, denial of service, 550
ACM Special Interest Group on masquerade, 549
MIME, 107
Communications
ARcount field, 130 modification of messages, 550
(SIGCOMM), 6
Area field, OSPF packets, 412 passive, 549
Active attacks, 549-550 replay, 549
.arpa,130
denial of service, 550 ARPANET, 24-26, 29, 54, 78-79 AndioNideo Transport Working
masquerade, 549 ASCII, 71 Group, 379
modification of messages, 550 ASPath attribute, Path Attributes field, Authentication Data field:
replay, 549 422-423 Authentication header, 580
Active threats, 547 Assured forwarding (AF) PHB, ESP packet, 581
Adaptive routing, 22, 387-390 335-336 OSPF packets, 413
Address Family field, RIP packet, 404 Asynchronous balanced mode Authentication header, IPv6, 292
Address mask reply message, 290 (ABM), 487 Authentication Type field, OSPF
Address mask request message, 290 Asynchronous response mode packets, 413
Addresses, 284-287 (ARM), 488 Authenticator, 568
network classes, 284-285 Asynchronous transfer mode (ATM), Authenticity, 549
subnets/subnet masks, 285-287 14,15,23,31,167,447,451-460 Authoritative Answer field, 135
Addressing, 280-281 cells, 454-457 Authorization field, 124
level, 280 cell loss priority (CLP), 456 Automatic repeat request (ARQ),
modes, 281 Generic Flow Control (GFC), 482-487
reliable sequencing network service, 456-457 Autonomous system (AS),
204-206 Generic Flow Control (GFC) 390-392,436
schemes, and routers, 63 field, 454 Aux Data Length field, group
scope, 281 Header Error Control (HEC) record, 433
Admission control, 309 field, 456 Auxiliary Data field, group record, 433
Adobe Pagemill, 32 logical connections in, 452 Available Bit Rate (ABR) service, 460
ADSL,29 meta-signaling channel, 453 Availability, 549
Advance Research Projects Agency Payload Type (PT) .field, 454-456
(ARPA),24 semipermanent virtual channels, 453
Advanced Encryption Standard service categories, 457-460 B
(ABS),552-555 Available Bit Rate (ABR) service,
.aero,130 460 Backoff, 253,519
AFS value, Content-type field, 106 Constant Bit Rate (CBR) service, binary exponential, 253, 519
AH information, and security 458-459 exponential RTO, 253
association, 579 Guaranteed Frame Rate (GFR) Backpressure,184-185
Algorithms: service, 460 Backward explicit congestion
Bellman-Ford,396-398 Non-Real-Time Service, 458, notification (BECN), 269
constraint-based routing, 367 459-460 Barber, Theodore, 115,419
decryption, 551,566 Non-Real-Time Variable Bit Rate Base station, 461,465
Dijkstra's, 394-396 (nrt-VBR), 459 Base64 transfer encoding, 108
distributed Bellman-Ford, 400-402 Real-Time Service, 458-459 Basic e-mail operation, SMTP, 95-97
encryption, 550,552-555,566 Real-Time Variable Bit Rate Batch retransmission strategy, 233
general-purpose, 566-568 (rt-VBR),459 Bellman-Ford algorithm, 396-398
Jacobson's, 250-253 Unspecified Bit Rate (UBR), Berners-Lee, Tim, 27-28
Karn's, 253-254 459-460 Best Current Practice (BCP), 9
least-cost, 393-399 Virtual Channel, 451-454 Best-effort service, 167,459
RED, 323-327 characteristics 452-453 BGP, See Border Gateway Protocol
routing, 309 control signaling 453-454 (BGP)
627
628 INDEX

BGP-4 messages, 420 Header Error Control (HEC) CLp, 456


Binary approach, explicit congestion field, 456 COAST, 582
signaJing, 186 Payload Type (PT) field, 454-456 Code field, ICMP message, 288
Binary exponential backoff, 253,519 Virtual Channel Identifier (VCI) Coefficient of variation, 201
Bit-round fair queuing (BRFQ), 315, field, 454 Collision, 519
317-318 Virtual Path Identifier (VPI) ,com,27
Bits per second (bps), 174 field, 454 Combined station, 487
,biz,130 Cellular network organization, 461-465 Command field, RIP packet, 404
Bolt Beranek and Newman (BBN), 26 Cellular radio, 461 Commands:
Border Gateway Protocol (BGP), Cellular Telecommunications and FTP,88-89
't.' 419-425 Internet Association, 469 HDLC,491
BGP-4 messages, 420 Cellular wireless networks, 447,460-468 SMTP,98
'\ cease (error), 423 adding new'channels, 463 Telnet,82
defined, 419 base station, 461, 465 Commercial Information Interchange
finite state machine error, 423 call accepted, 467 (CIX),27
functions, 420-421 call blocking, 467 Commercial networks, 29
hold timer expired, 423 call drop, 467 Communications network, 14
Keepalive message, 422 call termination, 467 Compressed Length field, SSL Record
message formats, 421 calls to/from fixed and remote Protocol header, 574
message header error, 423 mobile subscriber, 468 Compression, 574
messages, 421-423 cell sectoring, 464 Compuserve, 28
neighbor acquisition, 420, 422 cell splitting, 463-464 Computer Emergency response Team
neighbor reachability, 420 cellular network organization, (CERT),577
neighbors, 420,422 461-465 Computer security, 548
network reachability, 420-421 cellular radio, 461 Computer-aided design (CAD), 166
Notification message, 422-423 control channels, 466 Confidentiality, 548
Open message, 422 defined, 460 Configuration and name management,
open message error, 423 frequency borrowing, 463 590
Path Attributes field, 422-423 frequency reuse, 462-463 user requirements, 590
routing information exchange, handoff, 467 CONFIRM primitive, 53
423-425 increasing capacity, 463-464 Congestion, 164, 179-184
Update message, 422 microcells, 464 effects of, 183
update message error, 423 mobile telecommunications ideal performance, 181-182
bps,174 switching office (MTSO), 465 practical performance, 182-184
BRFQ, See Bit-round fair queuing mobile unit initialization, 466-467 Congestion control, 21, 164, 177,
(BRFQ) mobile-originated call, 467 184-187,246-263
Bridges, 62-63, 188,523-525 ongoing call, 467 backpressure, 184-185
operation, 524 operation, 465-468 choke packet, 185
Broadcast, 281, 426 paging, 467 explicit congestion signaling, 186-187
Browsers, 29,31-32 traffic channels, 466 binary approach, 186
Brute-force attack, 551-552 Centralized server farms, 165 credit-based approach, 187
Bucket, 312 and high-speed LANs, 512 rate-based approach, 187
Bus topology LAN, 517-519 Cerf, Vint, 26 implicit congestion signaling, 185-186
BYE method, SIP, 143 CERFnet,27 mechanisms for, 184
CERN,27-28 TCP, 246-263
CERT,577 TCP flow and, 247-250
c Change Cipher Spec Protocol, 575 Congestion control measures,
Channel capacity, 15 implementation of, 249
Cable modem, 29 Charles Spurgeon's Ethernet Web . Congestion Window Reduced (CWR)
Cache-Control field, 121 Site, 543 flag, 265
CAD, 166 Checksum, 56 Connection closing, SMTP, 101
Call accepted, 467 TCP header, 60 Connection establishment and
Call blocking, 467 Checksum field: termination, reliable sequencing
Call drop, 467 ICMP message, 288 network service, 209-211
Call termination, 467 Membership Report message, 433 Connection establishment, unreliable
Calls to/from fixed and remote mobile OSPF packets, 413 network service, 216-218
subscriber, 468 TCP header, 229-230 Connection field, 121
CANCEL method, SIP, 143 Choke packet, 185 Connection management phase,
Capacity requirements, 163 Ciphertext, 551, 566 VTP,79
CCITT,46 Circuit disconnect, 15 Connection setup, SMTp, 99-100
CD-ROM, 167 Circuit establishment, 14-15 Connection termination, reliable
Cease (error), 423 Circuit switching, 13,14-15,42 sequencing network service,
Cell loss priority (CLP), 456 circuit disconnect, 15 209,211-212
Cell relay, 451 circuit establishment, 14-15 Connection termination, unreliable
Cell Relay Retreat, 468 data transfer, 15 network service, 219-221
Cell sectoring, 464 CIX,27 Connection-mode service, logical link
Cell splitting, 463-464 Classical Ethernet, 517-521 control (LLC), 515-516
Cells, 451, 454-457 Classifier and route selection, 311 Connection-oriented transport
cell loss priority (CLP), 456 Classifier element, traffic conditiouing protocol mechanisms, 204-221
Generic Flow Control (GFC) function, 333 reliable sequencing network service,
field, 454 CLOSE primitive, 231 204-212
INDEX 629

addressing, 204-206 Customer-controlled normal response mode


connection establishment, 209-211 establishment/release, 454 (NRM),487
connection termination, 209, Cut-through switch, 527 operation, 490-494
211-212 Cyclades, 26 primary station, 487
flow control, 206-209 Cyclic redundancy check (CRC), secondary station, 487
multiplexing, 206 481-482,498-502 station types, 487-488
unreliable network service, 212-221 . defined, 498 trailer, 488
connection establishment, 216-218 modulo 2 arithmetic, 499-502 unbalanced configuration, 487
connection termination, 219-221 polynomials, 501-502 negative acknowledgment and
duplicate detection, 214-216 retransmission, 482
failure recovery, 221 piggybacking,478
flow control, 215-216 D positive acknowledgment, 482
ordered delivery, 213 retransmission after timeout, 482
retransmission strategy, 213 Damaged frame, 482 stop-and-wait ARQ, 483,484
Constant Bit Rate (CBR) service, Data Encryption Standard (DES), Data link control protocol, 473
458-459 552,603 Data Mark (DM) command, Telnet, 83
Constraint-based routing algorithm, 367 Data field, IP header, 283 Data mining, 29
Content Type field, SSL Record Data frame, 478 Data networks, 13-24
Protocol header, 574 Data length parameter, IP service asynchronous transfer mode (ATM),
Content types, MIME, 103-107 primitives, 282 14,15,23
Content-Encoding field, 127 Data link connection identifier circuit switching, 13,14-15
Content-Language field, 127 (DLCI),451 interaction of queues in, 180
Content-Length field, 127 Data link control, 473-509 local area networks (LANs), 23-24
Content-MD5 field, 127 acknowledgment frame, 478 metropolitan area networks
Content-Type field, 127 automatic repeat request (ARQ), (MANs), 24
Content-Version field, 127 482-487 packet switching, 13, 15-22
Contributing Source Identifier field, data frame, 478 wireless networks, 24
RTP fixed header, 373 data link control protocol, 473 Data Offset field, TCP header, 229
Control: error burst, 480 Data parameter, IP serv.ice
admission, 309 error control, 473,479,482-487 primitives, 282
congestion, 21, 164, 177, 184-187, damaged frame, 482 Data phase, VTP, 79
246-263 defined, 479 Data rate requirements, 163
data link, 472-509 go-back-N-ARQ, 483,485-487 Data stream push, 224
error, 19, 177, 191,240-246,473,479, lost frame, 482 Data transfer, 15
482-487 stop-and-wait flow control, Data transmission, 16
flow, 176-177,188-190,240-246, 483,484 Data transparency, 489
472-479 techniques for, 482 Database, and multicasting, 426
generic flow, 456-457 error correction, 479 Datagram, 17, 19,21,277
medium access control (MAC), 511, error-detecting code, 481 Datagram communication, 153-154
514,516-517,539-541 error detection, 473,479-482 Datagram sockets, 149
sliding-window flow, 476-479 cyclic redundancy check (CRC), Data-rate conversion, and packet-
stop-and-wait flow, 475-476 481-482 switching network, 18
Control channels, 466 parity check, 480-481 Date field, 121
Control connection, 89 types of errors, 480 Decryption algorithm, 551, 566
Control module (CM), 535 flow control, 473-479 Defense Advanced Research Projects
Control overhead, 174 defined, 473 Agency (DARPA), 54
Control phase, VTP, 79 sliding-window flow control, Delay, 168,174-175
Control signaling, 453-454 476-479 and inelastic traffic, 308
meta-signaling channel, 453 stop-and-wait flow control, Delay times throughput product,
semipermanent virtual channels, 453 475-476 175-177
Controlled cell transfer (CCT) frame check sequence (FCS), 481 Delay variation, 168
capability, 456 frame transmission, model of, 474 DELETE request method, 124
Controlled load, ISA, 313-314 go-back-N-ARQ, 483,485-487 Derived-From field, 127
.coop,130 high-level data link control (HDLC), DES, See Data Encryption Standard
Copy request method, 123 487-494 (DES)
Corporate WAN needs, 166 Address field, 490 Destination Address field:
Count field, RTP packets, 374 asynchronous balanced mode 802.3 frame format, 520
CRC, See Cyclic redundancy (ABM), 487 IP header, 283
check (CRC) asynchronous response mode IPv6,294
CRCfield: (ARM), 488 Destination address parameter, IP
LLC protocol data units (PDU), balanced configuration, 487 service primitives, 282
514 basic Characteristics, 487-488 Destination computer address, 45
MAC frames, 514, 516 combined station, 487 Destination MAC Address field, MAC
Credit-based approach, to explicit commands/responses, 491 frames, 516
congestion signaling, 187 Control field, 490 Destination Options header, IPv6, 292
Cryptanalysis, 551 data transparency, 489 Destination port:
CSMA/CD,519-520 Flag fields, 489 TCP header, 60
CSRC Count field, RTP fixed Frame Check Sequence field, 490 transport PDU header, 44
header, 372 frame structure, 488-490 Destination Port field, TCP header, 228
Cumulative option, acknowledge header, 488 Destination subnetwork address,
policy, 233 Information field, 490 packet header, 61
630 INDEX

Destination unreachable message, Drop-tail policy, 327 RCPT command, 100


288-289 DS, See Differentiated services (DS) receiver, 97
Differentiated services (DS), 305, DSIECN field, IPv6, 293-294 replies, 98-99
327-336 DSL,30-31 RFC 822,101-102
configurations/operation, 332-334 Duplicate detection, unreliable sender, 96-97
functions, 333-334 network service, 214-216 E-mail.SeeElectronicmail(e·mail)
traffic conditioning function, 333 DVD,167 Emerson, Ralph Waldo, 163
field, 330-332 Dynamic window sizing on congestion, Encapsulating Security Payload
codepoint, 330-332 255-258 header, IPv6, 292
key characteristics of, 328 Encapsulation, 48
per-hop behavior, 334-336 Encryption, 547
assured forwarding (AP) PHB, E Encryption algorithms, 550,
335-336 552-555,566
expedited forwarding (EF) PHB, Echo message, 289 Encryption devices, location of
334-335 Echo reply message, 289 555-556 '
services, 328-330 ECN-Echo (ECE) flag, 265 End systems (ESs), 62
terminology for, 329 EDI,29 End-to-end flow control, 190
Digital electronics, 166-167 .edu, 27, 130 Entity-Body field, 121
Digital signature, 568 EFF,552 Entity-Header field, 121
Digital still camera, 167 EIN,26 Entry·to-exit flow control, 190
Digital subscriber line (DSL), 30-31 Elastic traffic, 168,307-308 ERP, 391
Digital versative disk (DVD), 167 Electronic data interchange (EDI), 29 Error burst, 480
Dijkstra's algorithm, 394-396 Electronic Frontier Foundation Error control, 19,177,191,240-246,
Discard policy, 310 (EFF), 552 473,479,482-487
Distance-vector protocol, 399-405 Electronic mail (e-mail), 34, 95-110 adaptive retransmission timer, 243
Distance-vector routing, 392 Multi-purpose Internet Mail damaged frame, 482
Distributed Bellman-Ford algorithm, Extension (MIME), 95, defined, 479
400-402 102-110, 137 effect of window size on
Distributed computation, and application type, 106-107 performance, 240-242
multicasting, 426 application/octet-stream subtype, exponential average, 243-246
DLCI,451 106-107 internetworking, 279
DNS, See Domain Name System application/Postscript subtype, 107 lost frame, 482
(DNS) base64 transfer encoding, 108-110 retransmission strategy, 242-243
DNS data rule and base, 130-132 content types, 103-107 techniques for, 482
DNS database, 128 Content-Description field, 103 Error controlled service, data
DNS Extensions Working Group, 157 Content-ID field, 103 transport, 224
Domain Name field, 135 Content-Transfer-Encoding Error correction, 479
Domain name space, 128 field,103 Error-detecting code, 481
Domain Name System (DNS), 75, 115, Content-Type field, 103 Error detection, 473,479-482
128-137,148 defined,102 parity check, 489-481
defined, 128 header fields, 103 Error-detection code, transport PD U
DNS data rule and base, 130-132 image type, 106 header, 44
DNS database, 128 message type, 105 Escape sequence, compressed mode, 95
domain name space, 128 message/external-body ESP information, and security
domain names, 129-130 subtype, 106 association, 579
elements of, 128 message/partial subtype, 105 Ethernet, 31,55,58,191,517-522
header section, 135 message/rfcS22 subtype, 105 bus topology LAN, 517-519
message format, 136 MIME-Version field, 103 classical,517-521
messages, 135-137 multipart type, 103-105 CSMAlCD,519-520
name resolution, 133, 134-135 multipart/alternative subtype, 105 IEEE 802.3 medium options at
name servers, 128 multipart/digest subtype, 105 10 mbps, 521-522
operation, 132-137 multipart/mixed subtype, 105 MAC frame, 520-521
question section, 135-137 multipart/parallel subtype, 105 Expedited forwarding (EF) PHB,
resolvers, 128 overview of, 103 334-335
resource records (RRs), 130-132 quoted-printable transfer Expires field, 127
class element, 131 encoding, 107-108 Explicit congestion signaling,
domain name element, 131 text type, 103 186-187
Rdata element, 132 transfer encodings, 107-110 binary approach, 186
Rdata field length, 131 video type, 106 credit-based approach, 187
time to live element, 131 Simple Mail Transfer Protocol rate-based approach, 187
type element, 131 (SMTP), 75, 95-102, 203 Explicit congestion notification (ECN),
types of, 132 basic e-mail operation, 95-97 263-266,327
root name servers, 133-134 commands, 98 basic operation, 266
server hierarchy, 133-134 connection closing, 101 IP header, 264-265
top-level Internet domains, 130 connection setup, 99-100 TCP header, 265
zone, 133 DATA command, 100-101 TCP initialization, 265
Domain names, 129-130 defined,95 Explicit routing, 366
Don't fragment identifier parameter, MAIL command, 100 Exponential RTO back off, 253
IP service primitives, 282 mail transfer, 100-101 Extended service set (ESS), 538
Dropper element, traffic conditioning overview, 97-99 Extension field, RTP fixed header, 372
function, 333 protocol, 97 Extension-Header field, entities, 128
~ Extension-method, 124
Exterior routing protocol (ERP),
hop scope, 190
internetworking, 279 Glossary, 611-616
INDEX

Global synchronization, 322


631

391,419 multiple protocol layers, at, 189 Go-back-N-ARQ, 483,485-487


Extranets, 13,35-36 network interface, 190 .gov,130
performance, 241 GPS, See Generalized processor
reliable sequencing network service, sharing (GPS) ,
'I
F 206-209 Graphical user interface (GUI), 34 I.
retransmission strategy, 242-243 Group Address field, Membership
Facilities request, packet header, 61 scope, 189 Query message, 433
Facilities requests, 45 sliding-window, 476-479 Group Records field, Membership
~ Failure recovery, unreliable network stop-and-wait,475-476 Report message, 433
\ service, 221 unreliable network service, 215-216 Guaranteed Frame Rate (GFR)
Fair queuing (FQ), 314-315 Flow controlled service, data service, 460
Fast Ethernet, 511,528-530 transport, 224 Guaranteed service, ISA, 313
100BASE-T4,530-531 Flow descriptor, 351
100BASE-X,530 Flow Label field, IPv6, 294
full-duplex operation, 531 Forward explicit congestion H
Fast recovery, 259-262 notification (BECN), 269
Fast retransmit, 258-260 Forwarded field, 122 Handoff, 467
Fault, defined, 588 Forwarding equivalence class (FEC), Handshake Protocol, 575-577
Fault management, 588-589 359-361,365-368 phase 1, 575-577
overview, 588-589 FQ,314-315 CipherSuit param~ter, 576
user requirements, 589 Fragment Offset field: Compression Method parameter,
FCFS,314 fragment header, 299 576
FCS, See Frame check sequence (FCS) IP header, 283 Random parameter, 575
FEC, See Forwarding equivalence class Fragmentation, 574 Session ID parameter, 575
(FEC) Frame check sequence (FCS), 191,481 Version parameter, 575
Fibre Channel, 24 Frame Check Sequence field, 490 phase 2, 577
File transfer, 86-95 802.3 frame format, 521 phase 3, 577
File Transport Protocol (FTP), 26, 75, Frame relay, 14,23,31,447-451 phase 4, 577
77,86-95,203,307 background, 448-449 Hash functions, 559-565
commands, 88-89 LAPF core protocol, 450-451 one-way, 561-563
model, 87-89 protocol architecture, 449-450 secure, 563-564
options, 91-95 control plane, 449 SHA-l,564-565
ASCII option, 91 user plane, 449-450 HDLC, See High-level data link control
block mode, 93-94 User data transfer, 450-451 (HDLC)
compressed mode, 94-95 Address field, 451 HEAD request method, 123
data types, 91-92 Flag and Frame Check Sequence Header bits, 174
EBCDIC option, 91 (FCS) Header Checksum field, IP header, 283
file structure type, 92 fields, 451 Header Error Control (HEC) field, 456
file types, 92, 93 Frame Relay Forum, 468 Header Extension Length field:
image option, 91-92 Frame Relay Resource Center, 468 Hop-by-Hop Options header, 298
logical byte size option, 91-92 Frame structure, 488-490 routing header, 300
page structure type, 92 Frame transmission, model of, 474 Header format, TCP, 228-231
record structure type, 92 Frequency borrowing, 463 fields, 228-230
stream mode, 92 Frequency reuse, 462-463 push function, 230
transmission modes, 92-95 From field, 124 urgent function, 230
standard objectives, 86 FTP, See File Transport Protocol (FTP) Heaper hub (HHUB), 552
transfer, overview of, 89-91 FTP value, Content-type field, 106 Hello packet, OSPF, 413
transmission mode formats, 94 Full duplex service, data transport, 224 High-level data link control (HDLC),
Filler string format, compressed Full-duplex operation, Fast 487-494
mode, 95 Ethernet,531 asynchronous balanced mode
Finite state machine error, 423 Functions, Border Gateway Protocol (ABM), 487
First-corn, first served (FCFS), 314 (BGP),420-421 asynchronous response mode
First-in, first-out (FIFO) queuing (ARM), 488
disCipline, 314 basic characteristics, 487-488
First-only retransmission strategy, 233 G combined station, 487
Fixed routing, 386-387 commands/responses, 491·
Flags field: Gardner, Martin, 571 data transparency, 489
IP header, 283 Gateway, and security intermediary, 119 frame structure, 488-490
TCP header, 229 General Atomics, 27 Address field, 490
Flooding, 406-407 Generalized processor sharing (GPS), Control field, 490
Flow control, 176-177,188-190, 318-319 Flag fields, 489
240-246,473-479 General-purpose algorithm, 566-567 Frame Check Sequence field, 490
adaptive retransmission timer, 243 Generic flow control, 456-457 Information field, 490
defined, 473 Generic Flow Control (GFC) field, 454 header, 488
effect of window size on GET request method, 123 normal response mode (NRM), 487
performance, 240-242 Gigabit Ethernet, 511,531-533 operation, 490-494
end-to-end, 190 physical layer alternatives, 531-533 data transfer, 492
entry-to-exit, 190 Global address, key characteristics disconnect, 492
exponential average, 243-246 of, 281 examples of, 492-494
632 INDEX

High-level data link control I classifier and route selection, 311


(HDLC) (coni.) management agent, 311
initialization, 492 lAB, See Internet Architecture Board packet scheduler, 311
phases, 491 (lAB) rese:vation protocol, 310
primary station, 487 ICMP, See Internet Control Message routmg protocol, 311
secondary station, 487 Protocol (ICMP) discard policy, 310
station types, 487-488 Ideal network utilization, 181 Internet traffic, 307-309
trailer, 488 Identification field: elastic traffic, 307-308
High-speed Ethernet, 528-534, fragment header, 299 inelastic traffic, 308-309
See also Ethernet IP header, 283 packet discard, 309
10-Gbps Ethernet, 533-534 Identification parameter, IP service queuing discipline, 310, 314-321
Fast Ethernet, 528-530 primitives, 282 bit-round fair queuing (BRFQ)
Gigabit Ethernet, 531-533 Identifier field, 135 315,317-318 '
High-speed LANs: IDRP,425 fair queuing (FQ), 314-315
emergence of, 165-166,511-512 IEEE 802 LAN/MAN Standards generalized processor sharin a
requirements calling for, 512 Committee, 543 (GPS),318-319 "
High-speed local backbone, 166 IEEE 802 protocol architecture, 64 processor sharing (PS), 315-317
and high-speed LANs, 512 IEEE 802 reference model, 513-514 weighted fair queuing (WFQ),
High-speed wireless LANs, 511 IEEE 802.11, 511,537-542 319,320-321
HMAC,602 architecture, 537-538 random early detection (RED),
Hold timer expired, 423 medium access control, 539-541 321-327
Hop Limit field, IPv6, 294 access control, 540-541 algorithm, 323-327
Hop-by-Hop Options header, reliable data delivery, 539-540 defined, 322
297-299 physical layer, 541-542 design goals, 322-323
Hop-by-hop routing, 366 services, 538-539 explicit congestion notification
Host field, 124 association, 538-39 (ECN) , 327
HTML, See Hypertext Markup authentication, 539 motivation, 322
Language (HTML) disassociation, 539 routing algorithm, 309
privacy, 539 services, 311-314
HTTp, See Hypertext Transfer Protocol
reassociation, 539 best effort, 313-314
(HTTP)
HTTP versions, and proxy, 118 IEEE 802.11 Wireless LANWorking categories of, 311
Group, 543 controlled load, 313-314
Hubs, 522, 525-527
IEEE 802.3 medium options at 10 guaranteed service, 313
Hypertext Markup Language (HTML),
mbps, 511, 521-522 Integrated services (IS), 305
31-32,34
10BASE5 medium specification, 522 Integrated Services Working
Hypertext Transfer Protocol (HTTP),
10BASE-T medium specification, Group, 338
31,34,75,115-128,307
522 Integrity, 549
cache, 116,119
IEEE Communications Society, 6 Interconnection points, 27
client, 116 Inter-Domain Routing Protocol
connection, 116 IEEE Technical Committee on
Security and Privacy, 582 ' (IDRP), 419,425
defined, 116 Interfaces, and routers, 63
IESG,7
elements, 122 Interior routing protocols (IRP),
IETF, 6, See Internet Engineering Task
entities, 116, 127-128 385-413
Force (IETF)
body, 128 distance-vector protocol: RIP,
IETF Security Area, 582
defined, 127 399-405
If-Modified-Since field, 124
header fields, 127-128 Internet routing principles,
IGMP, See Internet Group
flexibility of, 117 Management Protocol (IGMP) 385-393
gateway, 116,119 Image type, MIME, 106 adaptive routing, 387-390
key terms related to, 117 Immediate option, acknowledge policy, autonomous systems, 390-392
messages, 116,119-123 233 distance-vector routing, 392
BNF (Backus-Naur Form) Implementation policy options, TCp, exterior routing protocol
notation, 119-120 232-234 (ERP),391
general header fields, accept policy, 232-233 fixed routing, 386-387
121-123 acknowledge policy, 233 interior routing protocol
general structure of, 120 deliver policy, 232 (IRP),391
Simple-Request and Simple- retransmit policy, 233 link-state routing, 392-393
Response messages, 121 send policy, 232 path-vector routing, 393
operations, example of, 117 Implicit congestion signaling, 185-186 routing approaches, 392-393
origin server, 116,117 Implicit congestion notification, 264 routing function, 386-390
overview, 117-123 INDICATION primitive, 53 least-cost algorithms, 393-399
proxy, 116, 118-119 Individual retransmission strategy, 233 Bellman-Ford algorithm, 396-398
request messages, 123-125 Inelastic traffic, 168,308-309 comparison of algorithms, 398-399
header fields, 124-125 Information security, 548 Dijkstra's algorithm, 394-396
methods, 123-124 Informational status codes, 125-126 link-state protocol: OSPF, 405-413
resource, 116 .int, 130 link-state routing approach, 405-407
response messages, 125-127 Integrated services architecture (ISA), flooding, 406-407
header fields, 125-127 305,306-314 general description, 405-406
server, 116 approach,309-310 Open Shortest Path First (OSPF)
tunnel, 116, 119 components, 310-311 protocol, 392,405-413
user agent, 116, 117 admission control, 309,310-311 area, 412
f
!

INDEX 633

Internet Engineering Task Force Flow Label field, 294


Database description packet, 413 Fragment header, 299
fields, 412-413 (IETF),7, 57,291
areas, 8 header, 293-296
Hello packet, 413 Hop Limit field, 294
link costs, 410-411 Internet Explorer, 28
Internet Group Managem ent Protocol Hop-by-H op Options header,
link -state acknowledgment 297-299
packet, 413 (IGMP), 419,430-434
defined, 430-431 IP Next Generatio n (IPng),
link-state request packet, 413 290-291
link-state update packet, 413 general query, 431
Group Address field, 433 multicast, 297
Maximize Reliability metric, 410 Next Header field, 294
Maximize Throughp ut metric, 411 group membership with IPv6, 434
group-and-source specific query, 431 Payload Length field, 294
Minimize Delay metric, 411 Routing header, 292,299-300
Minimize Monetary Cost group-specific query, 431
Max Response Time field, 433 Source Address field, 294
metric, 410 structure, 292-293
Normal metric, 410 Membership Query message, 431
Members hip Report message, 433 unicast, 297
overview, 407-410 Version field, 293
packet format, 412-413 message format, 431-434
Number of Sources field, 433 operation of, 58-61
packet types, 413 Options field, 283
Routing Informati on Protocol (RIP), operation, 434
QQIC (querier's querier interval Padding field, 283
399-405 Protocol field, 283
Address Family field, 404 code) field, 433
QRV (querier's robustness variable) route recording, 282
algorithm, 399-400 security option, 282 i
Command field, 404 field,433
S Flag field, 433 services, 282
counting to infinity problem, 403 Source Address field, 283
details, 402-404 Source Addresses field, 433
Type field, 431 source routing, 282
distance-sector route approach, specification of, 281-282
399-402 Internet Header Length (IHL) field, IP
header, 283 stream identification, 282
distributed Bellman-Ford Time to Live field, 283
algorithm, 400-402 Internet organizations, 7
Internet Protocol (IP), 54-61,203, timestamping, 282
increment al update, 402 Total Length field, 283
IP Address field, 404 281-300
addresses, 284-287 Version field, 283
limitations of, 404 Internet protocols, 273-300
Metric field, 404 network classes, 284-285
subnets/subnet masks, 285-287 internetworking, 273-281
packet format, 404-405 addressing, 280-281
poisoned reverse, 404 Data field, 283
Destinatio n Address field, 283 addressing level, 280
split horizons rule, 404 addressing modes, 281
topology changes, 402-403 Destinatio n Options header, 300
DS/ECN field, 283 addressing scope, 281
Version field, 404 basic operation, 273-276
Intermedi ate hubs, 522 Flags field, 283
Fragment Offset field, 283 broadcast, 281
Intermedi ate systems (ISs), 62 design issues, 276-281
Internatio nal Reference Alphabet Header Checksum field, 283
Identification field, 283 error control, 279
(IRA), 71 flow control, 279
Internet, 13,24-31 Internet Control Message Protocol
(ICMP),2 87-290 fragmentationireassembly,277-279
acceptable use pOlicies, 27 multicast, 281
ARPANE T, 24-26, 29 address mask reply message, 290
address mask request message, 290 routing, 276-277
brief history of, 24-27 unicast address, 281
culture of, 27 destination unreachab le message,
288-289 InteJ;Ilet resources, 5-6
interconnection points, 27 Internet service providers (ISPs),
Internet service providers (ISPs), echo message, 289
echo reply message, 289 28-29,28- 30
28-29
paramete r problem message, 289 Internet Society, 6
National Science Foundation, 26-27 Internet standards, 6~9
World Wide Web, 27-29 redirect message, 289
source quench message, 289 applicability statement (AS), 9
Internet address, 280-281 standardiz ation process, 7-8
Internet Architect ure Board (lAB), 7, time exceeded message, 289
timestamp message, 289-290 technical specification (TS), 9
54,577 Internet traffic, 307-309
Internet Control Message Protocol times tamp reply message, 289-90
Internet Header Length (IHL) elastic traffic, 307-308
(ICMP),2 87-290 inelastic traffic, 308-309
address mask reply message, 290 field, 283
IPv6, 57-58,290-300 Internetting, 26
address mask request message, 290 Internetworking, 61-65,273-281
destination unreachab le message, addresses, 296-297
anycast, 297 addressing, 280-281
288-289 addressing level, 280
echo message, 289 Authentication header, 292
Destinatio n Address field, 294 addressing modes, 281
echo reply message, 289 addressing scope, 281
paramete r problem message, 289 Destinatio n Options header, 292,
300 basic operation, 273-276
redirect message, 289 bridges, 62-63
source quench message, 289 DS/ECN field, 293-294
Encapsulating Security Payload broadcast, 281
time exceeded message, 289 defined, 61-62
timestamp message, 289-290 header, 292
enhancements over IPv4, 291 design issues, 276-281
timestamp reply message, 289-90 end systems (ESs), 62
Internet Engineering Steering Group extension headers, 292
flow label, 295-296 error control, 279
(IESG),7
634 INDEX

Internetworking (cant.) Version field, 293 Link field, 127


example, 64-65 Web page, 301 LINK request method 124
flow control, 279 IPv6 Forums, 301 Link-state acknowledgment packet
fragmentationlreassembly,277-279 IPv6 header, 58 OSPF,413 '
intermediate systems (ISs), 62 IpV6 Information Page, 301 Link-state protocol: OSPF, 405-413
internet, 62 IRA, 71 bnk costs, 410-411
intranets, 62 IS, 305 Maxim~e Reliability metric, 410
multicast, 281 ISA, See Integrated services Mru.:lI11.'ze Throughput metric, 411
routers, 62,63 architecture (ISA) Mmmllze Delay metric, 411
routing, 276-277 ISDN, 29 Minitnize Monetary Cost metric 410
subnetwork, 62 Normal metric, 410 '
unicast address, 281 overview, 407-410
Interoperability Lab, 543
Interpret as Command (lAC)
J Link-state request packet, OSPF 413
Link-state routing, 392-393,405-407
character, 82 Jacobson's algorithm, 250-253 flooding, 406-407
Intranets, 13,31-35,62 Jitter,18 general description, 405-406
advantages of, 31 and inelastic traffic, 308 Link-state update packet, OSPF 413
defined, 31 Jumbo payload option, Hop-by-Hop Living Internet web site, 36 '
electronic mail, 34 Options header, 298 LLC, See Logical link control (LLC)
features, 31 LLC data field, 802.3 frame format 521
intranetWeb,32-34 LLC PDU field, MAC frames, 516 '
Web content, 32 K Local area networks (LANs), 23-24,
Web/database applications, 32-34 31,61,511-542
Web/database connectivity, 33 Kalm, Bob, 26 10-Gbps Ethernet, 533-534
network news, 34--35 Karn's algorithm, 253-254 bridges, 523-525
INVITE method, SIp, 143-144 Keep-Alive field, 122-123 operation, 524
lP, See Internet Protocol (IP) Keepalive message, 422 Ethernet,517-522
IP Address field, RIP packet, 404 Kendall's notation, 200 bus topology LAN, 517-519
IP datagram, 60 Key distribution, 556-558 classical, 517-521
IP headers, 58 Key distribution center, 557 CSMNCD,519-520
IP service pritnitives, 282 Key management, 571-572 . IEEE 802.3 medium options at 10
IPSec protocol mode, and security mbps,521-522
association, 579 MAC frame, 520-521
IPv4 address formats, 285 L high-speed Ethernet, 528-534
IPv4IIPv6 security, 577-582 10-Gbps Ethernet, 533-534
Authentication header, 578,580-581 Label distribution, 367-368 Fast Ethernet, 528-530
Encapsulating Security Payload Label format/placement, 363-365 Gigabit Ethernet, 531-533
(ESP), 578,581-582 label stack, 364--365 high-speed LANs:
IPSec applications, 578 time to live processing, 364 emergence of, 165-166,511-512
IPSec scope, 578 Label switched path (LSP), 360, requirements calling for, 512
security association, 578-579 365-368 hubs, 525-527
IPv6, 57-58,290-300 topology of, 366 IEEE 802 reference model, 513-514
addresses, 296-297 Label switched routers (LSRs), layer 3 switches, 527-528
anycast, 297 345,359 logical link control (LLC), 514--516
Authentication header, 292 Labeled service, data transport, 224 acknowledged connectionless
Destination Address field, 294 LANs, See Local area networks service, 515-516
Destination Options header, (LANs) connection-mode service,
292,300 LAPF core protocol, 450-451 515-516
DSIECN field, 293-294 LAPF (Link Access Procedure for defined, 514
Encapsulating Security Payload Frame Mode Bearer Services), services, 514--515
header, 292 190,449 unacknowledged connectionless
enhancements over IPv4, 291 core formats, 450 service, 514--516
extension headers, 292 Last block in file, Descriptor field, 93 medium access control (MAC), 514,
flow label, 295-296 Last block in record, Descriptor 516-517
Flow Label field, 294 field, 93 physical layer, 514
fragment header, 299 Last-in, first-out (LIFO), 197 protocol architecture, 511,513-517
header, 293-296 Last-Modified field, 127 switches, 525-527
Hop Litnit field, 294 Layer 3 switches, 527-528 wireless LANs, 534--542
Hop-by-Hop Options header, Layers, OSI, 48 applications, 535-536
297-299 justification of, 49 IEEE 802.11 architecture,
IP Next Generation (IPng), principles used in defming, 47 537-538
290-291 Layer-specific standards, 52 IEEE 802.11 medium access
multicast, 297 Least-cost algorithms, 393-399 control, 539-541
Next Header field, 294 Length field: IEEE 802.11 physical layer,
Payload Length field, 294 BGP messages, 422 541-542
Routing header, 292,299-300 RTP packets, 374 IEEE 802.11 services, 538-539
security, 577-582, See also IPv4IIPv6 Length/Type field, 802.3 frame LAN requirements, 536-537
security format, 521 LocalPref attribute, Path Attributes
Source Address field, 294 Lifetime, and security association,.579 field, 422
structure, 292-293 Litnited transtnit, 261-263 . Location field, 125
unicast, 297 Link costs, OSPF, 410-411 Logical connections, 452
1
1

INDEX 635
Logical link control (LLC), 190, Message header error, Border Gateway Number of Sources field, 433
514-516 Protocol (BGP), 423 operation, 434
acknowledged connectionless Message type, MIME, 105 QQIC (querier's querier interval
service, 515-516 Messages: code) field, 433
connection-mode service, 515-516 Border Gateway Protocol (BGP), QRV (querier's robustness
defined, 514 421-423 variable) field, 433
services, 514-515 Domain Name System (DNS), S Flag field, 433
unacknowledged connectionless 135-137 Source Addresses field, 433
service, 514-516 Meta-signaling channel, 453 Type field, 431
Logical link control (LLC) layer, 64 Meter element, traffic conditioning multicast addresses, 425
London Internet Exchange (LINX), 27 function, 333 multicast extensions to Open
Lost frame, 482 Metric field, RIP packet, 404 Shortest Path First (MOSPF),
LSP, See Label switched path (LSP) Metropolitan area networks (MANs), 435-438
LSRs, See Label switched routers 24,533 equal-cost multipath ambiguities,
(LSRs) Microcells, 464 435
.mil,130 interarea multicast forwarders, 436
MIME, See Multi-purpose Internet interarea multicasting, 435-436
M Mail Extension (MIME) inter-AS multicast forwarders, 437
MIME-Version field, 123 inter-AS multicasting, 436-438
M Flag field, fragment header, 299 Minimize Delay metric, 411 wildcard multicast receiver, 436
MAC, See Medium access control Minimize Monetary Cost metric, 410 multiple unicast stra,tegy, 426
(MAC) Minor Version field, SSL Record Protocol Independent Multicast
MAC Control field, MAC frames, 516 Protocol header, 574 (PIM), 438-441
MAC frame, 520-521 MIS, 165 sparse-mode PIM, 439-441
Macrocells, 464 Mobile telecommunications switching strategy, 438-439
MAE East/MAE West, 27 office (MTSO), 465 requirements for, 429-430
MAIL command, SMTp, 100 Mobile unit initialization, 466-467 strategy, 427-428
Mail transfer, SMTP, 100-101 Mobile-originated call, 467 traffic generated by strategies, 428
Mail-server value, Content-type Modulo 2 arithmetic, 499-502 transmission example, 428
field, 106 Mosaic, 31 MultiExitDisc attribute, Path
Major Version field, SSL Record MOSPF, See Multicast Extensions to Attributes field, 422
Protocol header, 574 Open Shortest Path First Multimedia, and multicasting, 426
Management: (MOSPF) Multipart type, MIME, 103-104
accounting, 589 MOSPF Working Group, 441 Multipart/alternative subtype,
user requirements, 589 MOVE request method, 124 MIME, 105
configuration and name, 590 MPLS, See Multiprotocollabel Multipartldigest subtype,MIME, 105
user requirements, 590 switching (MPLS) Multipart/mixed subtype, MIME, 105
key, 571-572 MPLS Forum, 379 Multipart/parallel sUbtype, MIME, 105
retransmission timer, 250-254 MPLS Resource Center, 379 Multiple unicast strategy, 426
exponential RTO backoff, 253 MPLS Working Group, 379 Multiplexing, 221-222
Jacobson's algorithm, 250-253 MTSO, See Mobile example of, 223
Karn's algorithm, 253-254 telecommunications switching reliable sequencing network
RTT variance estimation, 250-253 office (MTSO) service, 206
window, 254-263 Multicast, 281, 297 Multiprotocollabel switching (MPLS),
Management agent, 311 Multicast Address field, group record, 433 345,357-368
Management information systems Multicast Extensions to Open Shortest background, 357-359
(MIS),165 Path First (MOSPF), 419, . connection-oriented QoS
MANs, See Metropolitan area 435-438 support, 358
networks (MANs) equal-cost multipath ambiguities, 435 rilUltiprotocol support, 359
Marker element, traffic conditioning interarea multicast forwarders, 436 traffic engineering, 358-359
function, 333 interarea multicasting, 435-436 virtual private network (VPN), 359
Marker field: inter-AS multicast forwarders, 437 forwarding equivalence class (FEC),
BGP messages, 422 inter-AS multicasting, 436-438 359-361,365-368
RTP fixed header, 372 wildcard multicast receiver, 436 label distribution, 367-368
Max Response Time field, Membership Multicasting, 425-441 label format/placement, 363-365
Query message, 433 applications, 426 label stack, 364-365
Maximize Reliability metric, 410 defined, 425 time to live processing,364
Maximize Throughput metric, 411 example configuration, 426-427 label stacking, 363
Maximum packet sizes, and routers, 63 Internet Group Management label switched path (LSP), 360,
Media files, 31 Protocol (IGMP), 430-434 365-368
Medium access control (MAC), 511, defined, 430-431 topology of, 366
514,516-517,539-541 general query, 431 label switched routers (LSRs), 359
access control, 540-541 Group Address field, 433 labels, 365-368
reliable data delivery, 539-540 group membership with IPv6, 434 operation, 359-363
Medium access control (MAC) group-and-source specific packet forwarding, 362
layer, 64 query, 431 route selection, 366-368
Message authentication code, 574 group-specific query, 431 constraint-based routing
Message format, Domain Name System Max Response Time field, 433 algorithm, 367
(DNS),136 Membership Query message, 431 explicit routing, 366
Message formats, Border Gateway Membership Report message, 433 hop-by-hop routing, 366
Protocol (BGP), 421 message format, 431-434 terminology, 360
636 INDEX

Multi-purpose Internet Mail Extension user requirements, 591 Change .Cipher Spec ProtOCOl, 575
(MIME), 95,102-110,137 Simple Network Management connectIOn, 573
application type, 106-107 Protocol (SNMP), 587, Handshake Protocol, 575-577
application/octet-stream subtype, 593-603 protocol stack, 573
106-107 Version 1, 593-597 record protocol, 574-575
application/Postscript subtype, 107 Version 2, 597-602 session, 573
base64 transfer encoding, 108 Version 3, 602-603 security requirements, 548-550
content types, 103-107 systems, 592-593 synunetric encryption, 547, 550-558
Content-Description field, 103 agent, 593 Advanced Encryption Standard
Content-ID field, 103 elements of, 592 (AES), 552-555
Content-Transfer-Encoding field, 103 manager, 593 brute-force attack, 551-552
Content-Type field, 103 Network management application ciphertext,551
defined, 102 (NMA),593 cryptanalysis,551
header fields, 103 Network management entity Data Encryption Standard (DES)
image type, 106 (NME),593 552 '
message type, 105 Network Management Web site, 603 decryption algorithm, 551
message/external-body subtype, 106 Network reachability, 420-421 encryption algorithms, 550,552-555
message/partial subtype, 105 Network security, 547-582 encryption devices, location of
message/rfc822 subtype, 105 active attacks, 549-550 555-556 '
MIME-Version field, 103 denial of service, 550 key distribution, 556-558
multipart type, 103-104 masquerade, 549 key distribution center, 557
multipart/alternative subtype, 105 modification of messages, 550 permanent key, 557
multipart/digest subtype, 105 replay, 549 plaintext, 550
multipart/mixed subtype, 105 active threats, 547 secret key, 550
multipart/parallel subtype, 105 authenticity, 549 security service module (SSM), 557
overview of, 103 availability, 549 session key, 557
quoted-printable transfer encoding, computer security, 548 traffic padding, 558
107-108 confidentiality, 548, 550-558 Transport Layer Security (TLS), 548,
text type, 103 defined, 548 572-573
transfer encodings, 107-110 encryption, 547 . Network service access point
video type, 106 hash functions, 559-565 (NSAP),52
,museum, 130 one-way, 561-563 Network World, 6
Myron Hlynka's QueueingTheciry secure, 563-564 Network-controlled
Page, 193 SHA-1,564-565 establishmentlrelease, 454
information security, 548 Networking configuration, 30-31
integrity, 549 Networking Links web site, 67
N IPv4/IPv6 security, 577-582 Next Header field:
Authentication header, 578, Authentication header, 580
.name,130 580-581 ESP packet, 581
Name resolution, 133, 134-135 Encapsulating Security Payload Hop-by-Hop Options header, 297
Name servers, 128 (ESP), 578,581-582 IPv6,294
National Institute of Standards and IPSec applications, 578 routing header, 299
Technology (NIST), 552 IPSec scope, 578 Next header field, fragment header,
National Science Foundation, 26-27 security association, 578-579 299
Negotiation phase, VTP, 79 message authentication, 559-565 NextHop attribute, Path Attributes
Neighbor acquisition, 420,422 approaches to, 559-563 field, 422-423
Neighbor reachability, 420 code, 560-561 Nodes, 14
Neighbors, 420, 422 using synunetric encryption, 559 Non-HTTTP server, and gateway, 119
.net,130 without message encryption, Non-Real-Time Service, 458, 459-460
Netscape Navigator, 28 559-560 Non-Real-Time Variable Bit Rate
Network access layer, 42 passive attacks, 549 (nrt-VBR),459
Network classes, 284-285 release of message contents, 549 Normal metric, 410
Network layer, OSI, 49 traffic analysis, 549 Normal response mode (NRM), 487
Network management, 587-603 passive threats, 547 Notification message, 422-423
accounting management, 589 public-key encryption, 547,565-572 NSAP,52
user requirements, 589 authenticator, 568 NScount field, 130
configuration and name cipher text, 566 NSFNET, 26-27
management, 590 decryption algorithm, 566 Number of Group Records field,
user requirements, 590 digital signature, 568 Membership Report message,
defined, 587 encryption algorithm, 566 433
fault, defined, 588 general-purpose algorithm, Number of Sources field:
fault management, 588-589 566-567 group record, 433
user requirements, 589 key management, 571-572 Membership Query message, 433
network management application plaintext, 566 NYSERnet, 27
(NMA),593 private key, 566
network management entity public key, 566
(NME),593 public-key certificate, 572 o
performance management, 590-591 RSA algorithm, 568-571
user requirements, 591 Secure Sockets Layer (SSL), 548, Octet tokens, 312
requirements, 588-591 572-577 Ongoing call, 467
security management, 591 architecture, 573 Opcode field, 135
INDEX 637
Open message, 422 Ordered delivery, unreliable network Performance management, 590-591
Open message error, 423 service, 213 user requirements, 591
Open Shortest Path First (OSPF) Ordered service, data transport, 224 Performance metrics, 173-178
protocol, 385, 392, 405-413 .org,130 congestion control, 177
area, 412 Origin attribute, Path Attributes delay, 174-175
Database description packet, 413 field, 422 delay times throughput product,
fields, 412-413 OSI, See Open Systems 175-177
Hello packet, 413 Interconnection (OSI) reference error control, 177
link costs, 410-411 model flow control, 176-177
link-state acknowledgment OSPF, See Open Shortest Path First queuing delays, 178
packet, 413 (OSPF) protocol stop-and-wait protocol, 176
link-state request packet, 413 OSPF working group, 414 throughput, 174
link-state update packet, 413 Performance requirements, 169-173
packet format, 412-413 response time, 169-173
packet types, 413 p throughput, 173
Open Systems Interconnection (OSI) Per-hop behavior, 334-336
reference model, 39,41,46-54 Packet discard, 309 assured forwarding (AF) PHB,
application layer, 49 Packet format, OSPF, 412-413 335-336
data link layer, 49 Packet forwarding, 362 expedited forwarding (EF) PHB,
environment, 50 Packet header, 60-61 334-335
layers, 48 Packet loss, 168 Permanent key, 557
justification of, 49 and inelastic traffic, 308 Permanent Negative Completion reply,
principles used in defining, 47 Packet scheduler, 311 SMTp, 98 '
network layer, 49 Packet switching, 13,15-22,42 Physical layer, 49,514
physical layer, 49 advantages o~ 16, 18 Piggybacking, 478
presentation layer, 49 basic operation, 16-19 PIM, See Protocol Independent
service primitives/parameters, compared to circuit switching, Multicast (PIM)
53-54 18-19 PIMWorking Group, 441
session layer, 49 data transmission, 16 Plaintext, 550,566
standardization within OSI datagram approach, 17, 19,21 Points of presence (PoPs), 533
framework, 51-53 disadvantages o~ 18-19 Poisoned reverse, 404
addressing, 52 packet size, 21 Poisson arrival rate, 201
protocol specification, 52 packets, use of, 16 Policies:
service definition, 52 routing, 21-22 acceptable use, 27
transport layer, 49 congestion, 22 discard, 310
Operation: failure, 21 drop-tail, 327
basic e-mail operation, SMTP, 95-97 switching technique, 19-21 TCP, 232-234
bridges, 524 virtual circuit approach, 19-20 Ports, 42
operation, 524 Packet Type field, RTP packets, 374 Positive acknowledgment, 482
cellular wireless networks, 465-468 Packet types, OSPF, 413 Positive Completion reply, SMTP, 98
operation, 465-468 Packets, 70-72 Positive Intermediate reply, SMTP, 98
differentiated services (DS), 332-334 Pad field, 802.3 frame format, 521 POST request method, 123
domain Name System (DNS), Pad Length field, ESP packet, 581 Power workgroups, 165-166
132-137 Pad1 option, Hop-by-Hop Options high-speed LANs, 512
explicit congestion notification, 266 header, 298 Pragma field, 123
Fast Ethernet, 531 Padding field: Preamble field, 802.3 MAC frames, 520
HDLC,490-494 ESP packet, 581 Presentation layer, OSI, 49
HTTP,l17 IF header, 283 Prip:l.ary station, 487
IGMp, 434 RTP fixed header, 372 Private key, 566
internetworking,273-276 RTP packets, 374 .pro,130
multiprotocollabel switching PadN option, Hop-by-Hop Options Processing delay, 174
(MPLS),359-363 header, 298 Processor sharing (PS), 315-317
packet switching, 16-19 Paging, 467 Projects, 608-610
protocol architecture, 45 Parameter problem message, 289 performance modeling, 609-610
RSVP (Resource ReSerVation Parameters field, ICMP message, 288 reading/report assignments, 610
Protocol), 351-356 Parity check, 480-481 research projects, 610
TCP,58-61 Passive attacks, 549 simulation, 609
TCP/IP,65-67 Passive threats, 547 sockets programming, 608-609
Telnet,78 PATCH request method, 123 Propagation delay, 174
Option data parameter, IP service Path MTU, and security association, Protocol, defined, 40
primitives, 282 579 Protocol architecture, 513-517
Option negotiation commands, Path-vector protocols, 419-425 application layer, 42
Telnet,82 routing, 393 defined, 41
Option subnegotiation commands, Payload Length field: need for, 39-40
Telnet,82 Authentication header, 580 network access layer, 42
Options field: IPv6,294 and networks, 43
Hop-by-Hop Options header, 298 Payload Type field, 454-456 operation o~ 45
IP header, 283 RTP fixed header, 372 peer layers, 40
TCP header, 230 PDUs, See Protocol data units (PDUs) ports, 42
OPTIONS method, SIP, 143 Peer, 40 protocol data unit (PDU), 44-45
OPTIONS request method, 123 Peer layers, 40 service access points (SAPs), 42
638 INDEX

Protocol architecture (cant.) processor sharing (PS), 315-317 RED, See Random early detection
simple, 40-46 weighted fair queuing (WFQ), 319, (RED)
standardized, 46 320-321 Redirect message, 289
three-layer model, 42-45 Quoted-printable transfer encoding, Redirection status codes, 125-126
transport layer, 42 107-108 References, 617-624
Protocol data units (PDUs), 44-45,48, Referrer field, 125
60,61,274 REGISTER method, SIP, 143
Protocol field, IP header, 283 R Release of message contents, 549
Protocol Independent Multicast (PIM), Reliability, and routers, 63
419,438-441 Radix-64 encoding, 109 Reliable Multicast Links, 441
,.' sparse-mode PIM, 439-441
strategy, 438-439
Raj Jain's home page, 267
Random early detection (RED),
Reliable sequencing network service
204-212 '
\ Protocol stack, 573 321-327 addressing, 204-206
Proxy, and security intermediary, 118 algorithm, 323-327 connection establishment and
Proxy server, 138 calculating average queue size, termination, 209-212
Proxy-Authenticate field, 127 324-325 connection termination, 209-212
Proxy-Authorization field, 124 determining packet discard, flow control, 206-209
PS, 315-317 325-327 multiplexing, 206
PSINet,27 defined, 322 Rendezvous point (RP), 439
Public field, 127 design goals, 322-323 Replicated byte format, compressed
Public key, 566 explicit congestion notification mode, 94
Public-key certificate, 572 (ECN),327 REQUEST primitive, 53
Public-key encryption, 547,565-572 motivation, 322 Request-Header' field, 121
authenticator, 568 Range field, 124 Request-Line field, 121
cipher text, 566 Rate-based approach, explicit Res field, fragment header, 299
decryption algorithm, 566 congestion signaling, 187 Reservation protocol, 310
digital signature, 568 Raw sockets, 149 Reserved field:
encryption algorithm, 566 RCPT command, SMTP, 100 Authentication header, 580
general-purpose algorithm, Rdata element, 132 fragment header, 299
566-568 Rdata field length, 131 TCP header, 229
key management, 571-572 Real-Time Service, 458-459 Resource records (RRs), 130-132
plaintex!, 566 Real-Time Transport Protocol (RTP), class element, 131
private key, 566 139,345,368-378 domain name element, 131
public key, 566 mixer, 371 Rdata element, 132
public-key certificate, 572 participant IP addresses, 371 Rdata field length, 131
RSA algorithm, 568-571 protocol, 370-373 time to live element, 131
PUT request method, 123 concepts, 370-372 type element, 131
fixed header, 372-373 types of, 132
protocol architecture, 369-370 Resource ReSerVation Protocol
application-level framing, 369 (RSVP), 327,345,346-357
Q integrated layer processing, data flows, 350-351
369-370 filter spec, 351
QDcount field, 130 RTCP port number, 371 flow descriptor, 351
QQIC (querier's querier interval code) RTP Control Protocol (RTCP), flowspec, 351
field, Membership Query 373-378 goals/characteristics, 348-350
message, 433 application-defined packet, 378 receiver-initiated reservation, 349
QRV (querier's robustness variable) formats, 375 soft state, 350
field, Membership Query Goodbye (BYE) packet, 378 host model, 357
message, 433 identification function, 373 operation, 351-356
Quality of service (QoS), 164-169 quality of service (QoS) and filtering, 353
on the Internet, 167-169 congestion control function, fixed-filter (FF) style, 354-355
support, protocols, 345-378 373 reservation attribute, 353
Query Class field, 137 Receiver Report (RR), 377 reservation styles, 353-356
Query Response field, 135 Sender Report (SR), 376-377 sender selection, 353
Query Type field, 137 session control function, 374 shared-explicit (SE) style, 356
Queuing, 195-201 session size estimation and scaling styles/attributes, 354
models, 196-197 function, 373-374 wildcard-filter (WF) style,
model characteristics, 196-197 Source Description (SDES) 353-354
queue parameters, 196 packet, 377-378 protocol mechanisms, 356-357
results, 197-201 RTP port number, 370 Response Code field, 135
assumptions, 199-200 translator, 371 RESPONSE primitive, 53
basic queuing relationships, Real-Time Variable Bit Rate Response time, 169-173
197-199 (rt-VBR),459 competing requirements, 170
single-server queues, 200-201 Real-time workgroups, and computer processing power, 170
Queuing delays, 178 multicasting, 426 response time ranges, 170
Queuing discipline, 310,314-321 Receiver buffer, 226 system response time, 171
bit-round fair queuing (BRFQ), 315, Receiver, SMTP, 97 user response time, 171
317-318 Record protocol, 574-575 World Wide Web (WWW),
fair queuing (FQ), 314-315 Record Type field, group record, 433 172-173
generalized processor sharing (GPS), Recursion Available field, 135 Response-Header field, 121
318-319 Recursion Desired field, 135 Response-Line field, 121
INDEX 639
Responses, high-level data link control RTP Control Protocol (RTCP), Sequence number:
(HDLC),491 373-378 TCP header, 60
Restart marker, Descriptor field, 94 application-defined packet, 378 transport PDU header, 44
Retransmission after timeout, 482 formats, 375 Sequence number counter, and security
Retransmission strategy, unreliable Goodbye (BYE) packet, 378 association, 579
network service, 213 identification function, 373 Sequence Number field:
Retransmission timer management, quality of service (QoS) and Authentication header, 580
250-254 congestion control function, 373 ESP packet, 581
exponential RTO backoft; 253 Receiver Report (RR), 377 RTP fixed header, 372-373
," Jacobson's algorithm, 250-253 Sender Report (SR), 376-377 TCP header, 229
\ Karn's algorithm, 253-254
RTT variance estimation, 250-253
session control function, 374
session size estimation and scaling
Sequencing, 19
Server error status codes, 125-126
Retry-After field, 127 function, 373-374 Server hierarchy, 133-134
Reuse factor, 463 Source Description (SDES) packet, Service access points (SAPs), 42,52
RFC 822,101-102 377-378 Service categories, ATM, 457-460
RFC publication, 7 RTP port number, 370 Available Bit Rate (ABR)
RFCtypes,9 RTT variance estimation, 250-253 service, 460
RFCs, 605-607 Constant Bit Rate (CBR) service,
RIP, See Routing Information Protocol 458-459
(RIP)
Root name servers, 133-134
s Guaranteed Frame Rate (GFR)
service, 460 ,
Route selection, MPLS, 366-368 S Flag field, Membership Query Non-Real-Time Service, 458,
Router alert option, Hop-by-Hop message, 433 459-460
Options header, 297-299 SAPs, See Service access points (SAPs) Non-Real-Time Variable Bit Rate
Router ID field, OSPF packets, 412 Satellite communication (SATNET), (nrt-VBR),459
Routers, 62, 63, 188 26 Real-Time Service, 458-459
packet discard, 309 SDUs,456 Real-Time Variable Bit Rate
routing algorithm, 309 Secondary station, 487 (rt-VBR),459
Routing, 21-22, 276-277 Secret key, 550 Unspecified Bit Rate (UBR),
congestion, 22 Secure Hash Algorithm (SHA-1), 459-460
failure, 21 564-565,568 Service data units (SDUs), 456
Routing algorithm, ISA, 309 Secure Sockets Layer (SSL), 548, Session Description Protocol (SDP),
Routing approaches, 392-393 572-577 137-139,148
Routing function, 385, 386-390 architecture, 573 Session Initiation Protocol (SIP), 75,
Routing header, IPv6, 292, 299-300 Change Cipher Spec Protocol, 575 115,137-148
Routing information exchange, connection, 573 Call-ID header, 146
423-425 Handshake Protocol, 575-577 client, 137
Routing Information Protocol (RIP), protocol stack, 573 componetns,137-139
385, 399-405 record protocol, 574-575 Contact header, 146
Address Family field, 404 session, 573 Content-Type header, 146
algorithm, 399-400 Security association: CSeq header, 146
Command field, 404 defined, 578 From header, 146
counting to infinity problem, 403 IP destination address, 579 header fields, 145
details, 402-404 parameter, 579 location service, 138
distance-sector route approach, security parameters (SPI), 579 Max-Forwards header, 146
399-402 security protocol identifier, 579 messages, 143-148
distributed Belhnan-Ford algorithm, Security intermediary: r.equests,143-146
400-402 and gateway, 119 responses, 146-148
incremental update, 402 and proxy, 118 operation examples, 140-142
IP Address field, 404 Security Parameters Index field: protocols, 137-139
limitations of, 404 Authentication header, 580 proxy server, 138
Metric field, 404 ESP packet, 581 redirect server, 138
packet format, 404-405 Security parameters (SPI), 579 registrar, 138
poisoned reverse, 404 Security protocol identifier, 579 response code, 143, 147
split horizons rule, 404 Security requirements, 548--549 server, 138
topology changes, 402-403 Security service module (SSM), 557 Session Description Protocol (SDP),
Version field, 404 Segment buffer, 227 137-139,148
Routing philosophies, comparison of, 406 Segment pacing, 247-248 To header, 146
Routing protocol, 311,385 Segments Left field, routing Uniform Resource Identifier (URl),
Routing Type field, routing header, 300 header, 300 139-140
RRs, See Resource records (RRs) Self-clocking behavior, 247 user agent, 138
RSA algorithm, 568-571 Self-similar traffic, 191-192 Via headers, 146
RSA public-key encryption algorithm, Semantics, 73 Session key, 557
568-571 protocols, 40 Session, Secure Sockets Layer
RSvp, See Resourse ReSerVation Semipermanent establishment/release, (SSL),573
Protocol 454 Settlements, 27
RSVP Project, 379 Semipermanent virtual channels, 453 Shaper element, traffic conditioning
RSVP Working Group, 379 Send buffer, 226 function, 333
RTCP port number, 371 Sender, SMTP, 96-97 SHA-1, See Secure Hash Algorithm
RTF, See Real-TIme Transport Sequence counter overflow, and (SHA-1)
Protocol (RTP) security association, 579 Shielded twisted pair (STP), 529
640 INDEX

Signaling: performance issues, 503-509 Stream sockets, 149


control, 453--454 stop-and-wait flow control, 503-504 Subnets/subnet masks, 285-287
explicit congestion, 186-187 timing of protocol, 505 Subnetworks, 58, 58-59, 62, 528
implicit congestion, 185-186 Slow start, 254-258 Successful status codes, 125-126
urgent data, 224 SMTP, See Simple Mail Transfer Su~pect data, Descriptor field, 93
Simple Mail Transfer Protocol (SMTP), Protocol (SMTP) SWitches, 525-527
75,95-102,203,307 SMTP/822 scheme, limitations of, 102 Switching:
basic e-mail operation, 95-97 SNMP, See Simple Network circuit, 13,14-15,42
commands, 98 Management Protocol (SNMP) multiprotocollabel switching
connection closing, 101 Sockets, 148-157 (MPLS), 345,357-368
t·' connection setup, 99-100 application programming interface packet, 13, 15-22, 42
\ DATA command, 100-101
defined, 95
(API),149
communication, 152-154
Symmetric encryption, 547, 550-558
Advanced Encryption Standard
MAIL command, 100 connection, 152 (AES),552-555
mail transfer, 100-101 datagram communication, 153-154 brute-force attack, 551-552
overview, 97-99 datagram sockets, 149 ciphertext, 551
protocol, 97 defined, 148-149 cryptanalysis, 551
RCPT command, 100 examples, 154-157 Data Encryption Standard (DES)
receiver, 97 functions, 150-151 552 '
replies, 98-99 interface calls, 149-154 decryption algoritlun, 551
RFC 822,101-102 IP addresses, 149 encryption algorithms, 550,552-555
sender, 96-97 port, 149 encryption devices, location of,
Simple Network Management Protocol raw sockets, 149 555-556
(SNMP), 56-57,61,307,587, setup, 149-152 key distribution, 556-558
593-603 stream communication, 152 key distribution center, 557
Version 1, 593-597 stream sockets, 149 permanent key, 557
basic concepts, 593-594 system calls, 154 plaintext, 550
Get capability, 594 Sockets application interface secret key, 550
management agent, 594 (API),115 security service module (SSM), 557
management information base SONET (synchronous optical session key, 557
(MIB),594 network), 31 . traffic padding, 558
management station, 594 Source Address field: Synchronization Source Identifier field:
network management 802.3 frame format, 520 RTP fixed header, 373
protocol, 594 IP header, 283 RTP packets, 376
network management protocol IPv6,294 Syntax, 73
architecture, 595-597 Source Address parameter, IP service protocols, 40
Notify capability, 594 primitives, 282 System calls, 154
Set capability, 594 Source Addresses field, Membership System Network Architecture
Version 2, 597-602 Query message, 433 (SNA),46
allowable data types, 600 Source MAC Address field, MAC
elements of, 598 frames, 516
GetBulkRequest-PDU,601 Source Port field, TCP header, 228 T
GetNextRequest-PDU,600-601 Source quench message, 289
GetRequest-PDU,600 Sources Addresses field, group TCP, See Transmission Control
InformRequest-PDU,602 record, 434 Protocol (TCP)
management information base Speed, need for, 164-169 TCP entity state diagram, 219
(MIB),598 Split horizons rule, 404 TCP header, 57, 60
protocol data units (PDU), 599-600 SSL, See Secure Sockets Layer (SSL) TCP segment, 56,59-60
protocol operation, 599-602 SSM,557 TCP services, summary of, 222
SetRequest-PDU,601 Standardization process, 7-8 TCP-FriendlyWebsite,267
SNMPv2-Trap-PDU,601-602 Standardized protocol architectures, 46 TCP/IP layers, 54-56
structure of management Stanford Research Institute (SRI), 24 TCP/IP protocol architecture, 39,46,
information (SMI), 598,599 Start Frame Delimited (SFD) field, 54-61
Version 3, 602-603 802.3 frame format, 520 application layer, 55
management information base State, 553 host-to-host layer, 55
(MIB),603 Station types, 487--488 internet layer, 55
User-Based Security (USM) Stations, 13 Internet Protocol (IP), 55
model, 602 Stop-and-wait ARQ, 483,484 IPv6,57-58
Simple Web Site, 603 Stop-and-wait flow control, 475--476, operation of, 58-61
Single-server queues, 200-201 503-504 network access layer, 55
formulas for, 200 Stop-and-wait protocol, 176 operation of TCP/IP, 65-67
SIP, See Session Initiation Protocol Store-and,forward switch, 527 physical layer, 55
(SIP) STp, 529 protocol interfaces, 61
SIP Forum, 158 Strategy: TCPIIP layers, 54-56
SIP Working Group, 158 batch retransmission, 233 Transmission Control Protocol
Skutch,Alexander,239 first-only retransmission, 233 (TCP),55
Sliding-window flow control, 476--479, individual retransmission, 233 operation of, 58-61
503-509 multiple unicast, 426 and UDP, 56-57
ARQ, 506-509 retransmission, error control, transport layer, 55
error-free sliding-window flow 242-243 TCP/IP protocol suite, 13,26,31,35,39,
control, 504-506 Stream communication, 152 41,46,80,595
r
I

INDEX 641
TCP/IP Resources List Web site, 235 congestion control, 246-263 Transport Layer Security (TLS)
Technical specification (TS), 9 TCP flow and, 247-250 protocol, 139,548,572-573
Teleconferencing, and multicasting, 426 congestion control measures, Transport PDU, 44-45
Telnet, 75, 77-86, 83, 148,203,305,307 implementation of, 249 header, 44
Abort Output (AO) command, 83 connection establishment, 231 Transport protocol timers, 214
assigned options, 84 connection maintenance, 224 Triple DES (3DES), 552
commands, 82 connection management, 222-223 Trivial File Transfer Protocol (TFTP),
Data Mark (DM) command, 83 connection termination, 224, 231 40,70-73
design of, 78 data transfer, 231 defined, 70
Interrrupt Process (IP) command, 83 data transport, 223-224 errors/delays, 71,73
longevity of, 86 error reporting, 224 packets, 70-72
network virtual terminal (NVT), explicit congestion notification semantics, 73
78-80 (ECN),263-266 syntax, 73
operational environment, 78 basic operation, 266 timing, 73
option negotiation, 85-86 IP header, 264--265 transfer overview, 72-73
Option negotiation commands, 82 TCP header, 265 Truncated field, 135
Option subnegotiation TCP initialization, 265 Two-way handshake, 217-218
commands, 82 flow control performance, 241 Type field:
options, 83-85 flow control/error control, 240-246 BGP messages, 422
remote terminal access, 78-80 adaptive retransmission timer, ICMP message, 288
server Telnet module, 80 243-246 Membership Query message, 431
synch mechanism, 83 effect of window size on Membership Report message, 433
transfer protocol, 80-82 performance, 240-242 OSPF packets, 412
user Telnet module, 80 exponential average, 243-246 Type of service indicators parameter,
virtual terminal protocol (VTP), 79 retransmission strategy, 242-243 IP service primitives, 282
Telnet.org, 110 simple average, 243 T-1 connection, 29
10 Gigabit Ethernet Alliance, 543 header format, 228-231
10-Gbps Ethernet, 533-534 fields, 228-230
Terminal access, 77-86 push function, 230 u
TFT value, Content-type field, 106 urgent function, 230
TFTP, See Trivial File Transfer Protocol implementation policy options, UDp, See User Datagram Protocol
(TFTP) 232-234 (UDP)
3G Americas, 469 accept policy, 232-233 UDP header, 57
Three-layer model, 42-45 acknowledge policy, 233 Uncompressed data format,
Three-way handshake, 218-220 deliver policy, 232 compressed mode, 94
examples of, 220 retransmit policy, 233 Unicast, 297
Throughput, 168, 173, 174 send policy, 232 Unicast address, 281
and inelastic traffic, 308 implicit congestion notification, 264 Uniform Resource Identifier (URI),
Time exceeded message, 289 mechanisms, 231 139-140 .
Time to live element, 131 multiplexing,221-222 Unless field, 125
Time to Live field, IP header, 283 operation of, 58-61 UNLINK request metbod, 124
Time to live parameter, IP service receiver buffer, 226 Unreliable network service, 212-221
primitives, 282 retransmission timer management, connection determination, 220-221
Timely service, data transport, 224 250-254 connection establishment, 216-220
Timestamp field, RTP fixed header, 373 exponential RTO back off, 253 duplicate detection, 214--216
Timestamp message, 289-290 Jacobson's algorithm, 250-253 failure recovery, 221
Timestamp reply message, 289-90 Karn's algoritbm, 253-254 flow control, 216
Timing: RTT variance estimation, 250-253 . ordered delivery, 212-213
protocols, 40 segment buffer, 227 retransmission strategy, 213-214
TFTP, 73 segment pacing, 247-248 Unshielded twisted pair (UTP), 529
Title field, 127 self-clocking behavior, 247 Unspecified Bit Rate (UBR), 459-460
Token bucket scheme, 312 send buffer, 226 Update message, 422
Top-level Internet domains, 130 service categories, 221-224 Update message error, 423
Total Lengtb field, IP header, 283 service parameters, 227 Upgrade field, 123
Traffic analysis, 549 service primitives, 224--226 Urgent data signaling, 224
Traffic channels, 466 service request primitives, 225 Urgent Pointer field, TCP header, 230
Traffic conditioning function, 333 service response primitives, 226 URI,139-140
Traffic control, 239-266 services, 221-226 URL-Header field, 128
Traffic management, 187-188 summary of, 222 .us,130
fairness, 187 special capabilities, 224 USENET, 6,34--36,345
quality of service, 187-188 traffic control, 239-266 User data transfer, 450-451
reservations, 188 UDP, and, 56-57 Address field, 451
Traffic padding, 558 window management, 254--263 Flag and Frame Check Sequence
Traffic specification (TSpec), 311 dynamic window sizing on (FCS) fields, 451
Transfer encodings, MIME, 107-110 congestion, 255-258 User Datagram Protocol (UDP),
Transfer-Encoding field, 127-128 fast recovery, 259-262 56-57,61,167,203,234--235
Transient Negative Completion reply, fast retransmit, 258-260 header, 235
SMTP,98 limited transmit, 261-263 User modules (UMs), 535
Transmission Control Protocol (TCP), slow start, 254--256,257,258 User-Agent field, 125
55, 203, 226-234 Transmission delay, 174 User-Based Security (USM)
basic operations, 226-228 Transport layer, 42,55 model, 602
642 INDEX

User-network interface (UNI), 456 Web/database system, compared to increasing capacity, 463-464
UTP,529 traditional database approach, microcells, 464
UUNET,27 32-33 mobile telecommunications
Weighted fair queuing (WFQ), 319, switching office (MTSO), 465
320-321 mobile unit initialization, 466-467
v WFQ, See Weighted fair queuing
(WFQ)
mobile-originated call, 467
ongoing call, 467
Vendors, 6 Wholesalers, and ISPs, 29 operation, 465-468
Verison field, IP header, 283 Wide area networks (WANs), 15, paging, 467
Version field: 23-24,31,61,447-468 traffic channels, 466
IPv6,293 asynchronous transfer mode (ATM), corporate WAN needs, 166
OSPF packets, 412 451-460 frame relay, 447-451
RIP packet, 404 cell loss priority (CLP), 456 background, 448-449
RTP fixed header, 372 cells, 454-457 control plane, 449
RTP packets, 374 control signaling, 453-454 protocol architecture, 449-450
Video type, MIME, 106 generic flow control, 456-457 user plane, 449-450
View-Based Access Control Model Generic Flow Control (GFC) user data transfer, 450-451
(VACM),602 field,454 Address field, 451
Vine, Barbara, 163,273 Header Error Control (HEC) Flag and Frame Check Sequence
Virtual Channel Identifier (VCI) field,456 (FCS) fields, 451
field,454 logical connections in, 452 Wi-FiAlliance, 543
Virtual channels, 451-454 meta-signaling channel, 453 Window field, TCP header, 229
characteristics of, 452-453 Payload Type (PT) field, 454-456 Window management, 254-263
semipermanent, 453 semipermanent virtual dynamic window sizing on
Virtual channels/virtual paths, 451-454 channels, 453 congestion, 255-258
Virtual circuit, 19-20 service categories, 457-460 fast recovery, 259-262
Virtual Path Identifier (VPI) field, 454 Virtual Channel Identifier (VCI) fast retransmit, 258-260
Virtual paths, 451-454 field,454 limited transmit, 261-263
advantages of, 452 virtual channels/virtual paths, slow start, 254-258
characteristics of, 452-453 451-454 Wireless Ethernet Compatibility
customer-controlled Virtual Path Identifier (VPI) Alliance (WECA), 542
establishment/release, 454 field,454 Wireless LAN Alliance, 543
methods, 454 cellular wireless networks, 460-468 Wireless LANs, 534-542
network-controlled adding new channels, 463 applications, 535-536
establishment/release, 454 base station, 461,465 IEEE 802.11 architecture, 537-538
semipermanent call accepted, 467 IEEE 802.11 medium access control,
establishment/release, 454 call blocking, 467 539-541
Virtual private network (VPN), 36 call drop, 467 IEEE 802.11 physical layer, 541-542
Voice over IP (VoIP), 137 call termination, 467 IEEE 802.11 services, 538-539
calls to/from fixed and remote LAN requirements, 536-537
mobile subscriber, 468 Wireless networks, 24
w cell sectoring, 464
cell splitting, 463-464
World Wide Web (WWW),27-29,116
WRAPPED request method, 124
WANs, See Wide area networks cellular network oranization, WWW, See World Wide Web (WWW)
(WANs) 461-465 WWW Consortium, 157
Web content, Intranet Web, 32 cellular radio, 461 WWW-Authenticate field, 127
Web resources, 5-6 control channels, 466
Web/database applications, Intranet defined, 460
Web,32-34 frequency borrowing, 463 z
Web/database connectivity, 33 frequency reuse, 462-463
Intranet Web, 33 handoff, 467 Zone, 133

Das könnte Ihnen auch gefallen